{"id":27760,"date":"2026-03-12T13:45:38","date_gmt":"2026-03-12T08:15:38","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=27760"},"modified":"2026-04-06T15:48:30","modified_gmt":"2026-04-06T10:18:30","slug":"shadow-ai-is-indias-fastest-growing-security-threat-and-most-cisos-dont-see-it-coming","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/shadow-ai-is-indias-fastest-growing-security-threat-and-most-cisos-dont-see-it-coming\/","title":{"rendered":"Shadow AI is India\u2019s Fastest Growing Security Threat &#8211; And Most CISOs Don\u2019t See It Coming"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27760\" class=\"elementor elementor-27760\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03f880d e-flex e-con-boxed e-con e-parent\" data-id=\"03f880d\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb2d667 elementor-widget elementor-widget-heading\" data-id=\"eb2d667\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">The Massive Impact Of AI On Indian Work Life<span style=\"font-size: 2.5rem; font-style: inherit;\"><\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ecc02ef e-con-full e-flex e-con e-parent\" data-id=\"ecc02ef\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4a29e2 elementor-widget elementor-widget-text-editor\" data-id=\"c4a29e2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"font-weight: 400;\">Earlier this year, the AI Impact Summit positioned India as a future tech leader in this space through a series of incentives and initiatives. Yet, the fact remains &#8211; AI already plays a prevalent yet precarious role in the work lives of many Indian professionals across the country. The 2025 BCG AI at Work survey provides a snapshot of this complex scenario:<\/span><\/p><table><tbody><tr><td><p><b>Indian professionals lead the world in genAI adoption.<\/b><\/p><p><i><span style=\"font-weight: 400;\">92% of Indian employees use the tech regularly for work &#8211; the highest number among surveyed countries.<\/span><\/i><\/p><\/td><td><p><b>High AI usage is linked to greater concerns over job security.<\/b><\/p><p><i><span style=\"font-weight: 400;\">48% of respondents from India believe their job will certainly or probably disappear in the next decade because of AI &#8211; higher than the global average of 41%.<\/span><\/i><\/p><\/td><td><p><b>At the same time, AI is helping employees save time.<\/b><\/p><p><i><span style=\"font-weight: 400;\">47% report that they save more than an hour a day by using AI for work.<\/span><\/i><\/p><\/td><\/tr><\/tbody><\/table><p><span style=\"font-weight: 400;\">It is adoption borne out of equal parts function and fear. Unfortunately, enterprise AI governance has not kept pace with this adoption &#8211; only 36% of employees feel adequately trained, while 37% say their company doesn\u2019t provide the right AI tools. When these measures are not put in place, employees often train themselves using public YouTube tutorials or forums that almost always seem to recommend free, unapproved tools. As a result, 54% of employees end up using these unauthorised alternatives &#8211; a figure rising to 62% among Gen Z and millennials.<\/span><\/p><p><span style=\"font-weight: 400;\">What turns this scenario into India\u2019s fastest growing security threat is the following trend: the percentage of sensitive corporate data being fed into AI tools has skyrocketed from 10% to over 25% in just one year, according to IDC. Instances like the Samsung ChatGPT leak, where company code was irreversibly entered into genAI public models, led to exposed trade secrets, significant reputational damage and potential losses surpassing millions. Considering the landscape, Indian CISOs must immediately take steps to stop shadow AI originating from their organization.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d9631b2 e-flex e-con-boxed e-con e-parent\" data-id=\"d9631b2\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb8df76 elementor-widget elementor-widget-heading\" data-id=\"bb8df76\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Shadow AI: The More Evolved Successor To Shadow IT\n<span style=\"font-size: 2.5rem; font-style: inherit;\"><\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ab275b4 e-con-full e-flex e-con e-parent\" data-id=\"ab275b4\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f93612e elementor-widget elementor-widget-text-editor\" data-id=\"f93612e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In many ways, shadow AI is a subset of shadow IT, which involves employees using tools and applications without your IT teams knowing about it. The emergence of shadow AI has certainly created a lot more use cases for IT teams to deal with:<\/span><\/p><table><tbody><tr><td><p><b>Shadow IT<\/b><\/p><\/td><td><p><span style=\"font-weight: 400;\">\u25b6\ufe0f<\/span><\/p><\/td><td><p><b>Shadow AI<\/b><\/p><\/td><\/tr><tr><td><p><span style=\"font-weight: 400;\">Signing up for unapproved Trello accounts \/ projects<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">\u25b6\ufe0f<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">Unauthorized accounts in AI apps like ChatGPT and Perplexity<\/span><\/p><\/td><\/tr><tr><td><p><span style=\"font-weight: 400;\">Hoarding customer data in personal Dropboxes<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">\u25b6\ufe0f<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">Agentic AI tools that can process sensitive data and become prone to misconfigurations<\/span><\/p><\/td><\/tr><tr><td><p><span style=\"font-weight: 400;\">Creating unauthorized OneDrive instances<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">\u25b6\ufe0f<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">Excel automation scripts integrated with GPT APIs<\/span><\/p><\/td><\/tr><\/tbody><\/table><p><span style=\"font-weight: 400;\">Yet, this is where the comparisons end. Shadow IT merely stores data &#8211; <\/span><i><span style=\"font-weight: 400;\">shadow AI, on the other hand, consumes it.<\/span><\/i><span style=\"font-weight: 400;\"> As seen by the Samsung incident, public AI models often retain training inputs, creating an irreversible governance issue regarding data privacy and where your intellectual property ultimately resides.<\/span><\/p><p><span style=\"font-weight: 400;\">Moreover, the added psychological motives behind the usage of shadow AI make it that much harder to track &#8211; <\/span><i><span style=\"font-weight: 400;\">and this is where CISOs today don\u2019t see the fallout coming.<\/span><\/i><span style=\"font-weight: 400;\"> The motives behind usage of both shadow IT and shadow AI are rooted in productivity enhancement. However, usage of shadow AI &#8211; as seen in the aforementioned BCG report &#8211; is also about professional self-preservation. Many professionals want AI to help them solve problems without revealing that they use it to their supervisors because of a fear that this will make their role redundant. This complex scenario makes it critical for enterprises to incorporate a nuanced, multifaceted strategy when trying to combat shadow AI.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7247f51 e-flex e-con-boxed e-con e-parent\" data-id=\"7247f51\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93fc97f elementor-widget elementor-widget-heading\" data-id=\"93fc97f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The Added Risks That Emerge From Shadow AI Usage<span style=\"font-size: 1.5rem; font-style: inherit;\"><\/span><\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de39da7 e-con-full e-flex e-con e-parent\" data-id=\"de39da7\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6b0102 elementor-widget elementor-widget-text-editor\" data-id=\"d6b0102\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The goal of this strategy should be to capture the upside AI can have on your organization while sidestepping disasters that can come in many varied forms:<\/span><\/p><ul><li aria-level=\"1\"><b>Data Leakage: <\/b><span style=\"font-weight: 400;\">Most free, unauthorized AI tools have terms of service that allow for it to use your data for training. Once a model ingests your sensitive information, it is nearly impossible for it to delete or unlearn that information.<\/span><\/li><\/ul><ul><li aria-level=\"1\"><b>Issues With IP &amp; Licensing:<\/b><span style=\"font-weight: 400;\"> Any kind of generation done by employees can have grave consequences with regards to your IP. If a developer generates code from an open-source software which somehow makes its way to your proprietary product, you could be legally forced to open-source your entire application. Similarly, if you use public GPTs to create company logos and materials, you technically do not own this material &#8211; meaning your IP is completely defenseless if a competitor tries to copy it.<\/span><\/li><\/ul><ul><li aria-level=\"1\"><b>Less Reliability: <\/b><span style=\"font-weight: 400;\">AI tools are notoriously known to make up fake facts and figures. If employees use this data in important company assets without verifying them, it could lead to reputational damage for your enterprise. A related yet more insidious risk is package hallucination &#8211; if you ask AI for code libraries for problem solving, it may invent\/hallucinate a plausible-sounding package. Cyberattackers, in turn, can track these hallucinations and fill the fake packages with malware.<\/span><\/li><\/ul><ul><li aria-level=\"1\"><b>Compliance &amp; Regulatory Exposure: <\/b><span style=\"font-weight: 400;\">Public AI tools process data on servers all over the world. This becomes a compliance nightmare for organizations under the purview of the DPDP Rules that mandate data localization, in addition to enterprises in highly regulated sectors like healthcare and BFSI. It could all lead to highly debilitating compliance penalties, which can go upto \u20b9250 crore under DPDP.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">Considering all this added risk, many CISOs out there may be considering banning any &amp; all AI tools. Yet, AI has proven to be beneficial if governed properly, and there is no guarantee that employees won\u2019t find ways to sidestep this ban. The solution, therefore, lies in an effective mix of people, processes and technology.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43e4b9b e-flex e-con-boxed e-con e-parent\" data-id=\"43e4b9b\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bffb71c elementor-widget elementor-widget-heading\" data-id=\"bffb71c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The Three-Pronged Approach To Combating Shadow AI\n\n<span style=\"font-size: 1.5rem; font-style: inherit;\"><\/span><\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35faa1b e-con-full e-flex e-con e-parent\" data-id=\"35faa1b\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f3e385 elementor-widget elementor-widget-text-editor\" data-id=\"4f3e385\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Your enterprise probably has a framework for dealing with shadow IT compromising of the following:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Having a preset list of allowed tools &amp; applications<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Setting security controls to mitigate data leakage<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Educating employees about safe usage of these tools<\/span><\/li><\/ul><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">Creating a framework to combat shadow AI will involve many of the same principles, but with dynamic, evolved governance as its backbone:<\/span><\/p><p>\u00a0<\/p><table><tbody><tr><td colspan=\"3\"><p><b>The Three Organizational Elements Required To Successfully Combat Shadow AI<\/b><\/p><\/td><\/tr><tr><td><p><b>AI <\/b><b><i>Policy<\/i><\/b><b> For Acceptable Use<\/b><\/p><\/td><td><p><b>Real-Time AI <\/b><b><i>Security\u00a0<\/i><\/b><\/p><\/td><td><p><b>Effective AI <\/b><b><i>Training<\/i><\/b><\/p><\/td><\/tr><tr><td colspan=\"3\"><p><b>The Difference In Approach<\/b><\/p><\/td><\/tr><tr><td><p><span style=\"font-weight: 400;\">Your enterprise must create a flexible, fast-moving framework for responsible AI usage, as bureaucracy only ends up breeding more shadow AI.<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">Controls must be real-time and preventive &#8211; blocking leakage of data while or before it\u2019s happening, without hampering productivity.<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">Rather than periodic programs, you must undertake ongoing, contextual education that evolves with the rapidly changing AI landscape.<\/span><\/p><\/td><\/tr><tr><td colspan=\"3\"><p><b>Ideal Components In A Successful Strategy<\/b><\/p><\/td><\/tr><tr><td><ul><li aria-level=\"1\"><b>Dynamic Classification of AI tools: <\/b><span style=\"font-weight: 400;\">Use team audits to figure out all the tools they use, and then classify them either as <\/span><i><span style=\"font-weight: 400;\">approved, prohibited <\/span><\/i><span style=\"font-weight: 400;\">or <\/span><i><span style=\"font-weight: 400;\">limited-use <\/span><\/i><span style=\"font-weight: 400;\">(ex. tool is allowed for research, but no internal data can be used)<\/span><\/li><li aria-level=\"1\"><b>Internal Sandboxes: <\/b><span style=\"font-weight: 400;\">Private instances of models employees use, ensuring data never leaves your secure cloud boundaries.<\/span><\/li><li aria-level=\"1\"><b>Rapid Tool Approval System: <\/b><span style=\"font-weight: 400;\">For low-risk tool requests, create a quick review process that doesn\u2019t exceed 1-2 days.<\/span><\/li><\/ul><\/td><td><ul><li aria-level=\"1\"><b>AI-Specific DLP: <\/b><span style=\"font-weight: 400;\">Your enterprise must create DLP gateways that detect sensitive patterns in prompts and provide <\/span><i><span style=\"font-weight: 400;\">real-time anonymisation <\/span><\/i><span style=\"font-weight: 400;\">which involves automatic replacement with tokens before the request ever reaches the AI provider. Moreover, there must be a mechanism to log the content of these prompts for later forensic review.<\/span><\/li><li aria-level=\"1\"><b>Zero-Trust Identity Enforcement:<\/b><span style=\"font-weight: 400;\"> Access to these tools should only be conducted through corporate logins, to facilitate data revocation at any time.<\/span><\/li><\/ul><\/td><td><ul><li aria-level=\"1\"><b>Judgment-Free Programs: <\/b><span style=\"font-weight: 400;\">Training must shift from policing to partnership, recognising and rewarding the teams that follow best practices. Create programs amongst your employees that compel them to discuss the\u00a0 applications and dangers of AI amongst themselves.<\/span><\/li><li aria-level=\"1\"><b>Gamification: <\/b><span style=\"font-weight: 400;\">The best training programs are those that engage your employees and create a healthy competitive spirit that makes them personally invested in making your enterprise more secure. Incorporate leaderboards, challenges and interactive assessments to pique their interest.<\/span><\/li><\/ul><\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d52584b e-flex e-con-boxed e-con e-parent\" data-id=\"d52584b\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f724dd elementor-widget elementor-widget-heading\" data-id=\"5f724dd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How Does Your Enterprise Go About Fighting Shadow AI Today?<span style=\"font-size: 1.5rem; font-style: inherit;\"><\/span><\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6b9268 e-con-full e-flex e-con e-parent\" data-id=\"c6b9268\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d8894d elementor-widget elementor-widget-text-editor\" data-id=\"7d8894d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The aforementioned BCG report points out a critical factor in turning the tides against shadow AI: the importance of leadership support. Only 25% of frontline workers report receiving it, but when it is present, it leads to significant improvements in job satisfaction and career optimism.<\/span><\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">That\u2019s why, as a CISO, combating shadow AI is more than just about eradicating the many risks that come with it. If done correctly, it can truly empower your employees and reinforce an innovation-first work culture &#8211; where human expertise and AI prowess come together to transform your organization.\u00a0<\/span><\/p><p><br \/><span style=\"font-weight: 400;\">This is where partnering with a managed services provider that has proven success in implementing AI governance across sectors &#8211; like iValue &#8211; can prove to be highly beneficial for your enterprise. <\/span><span style=\"font-weight: 400;\">Click here<\/span><span style=\"font-weight: 400;\"> to speak to one of our experts on how you can go about eradicating the menace of shadow AI from your organization, while safely leveraging the many benefits AI brings.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Massive Impact Of AI On Indian Work Life Earlier this year, the AI Impact Summit positioned India as a future tech leader in this space through a series of incentives and initiatives. Yet, the fact remains &#8211; AI already plays a prevalent yet precarious role in the work lives of many Indian professionals across &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/shadow-ai-is-indias-fastest-growing-security-threat-and-most-cisos-dont-see-it-coming\/\"> <span class=\"screen-reader-text\">Shadow AI is India\u2019s Fastest Growing Security Threat &#8211; And Most CISOs Don\u2019t See It Coming<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":19,"featured_media":27765,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[131],"tags":[498,249,669,670,672,671],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/27760"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=27760"}],"version-history":[{"count":8,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/27760\/revisions"}],"predecessor-version":[{"id":28163,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/27760\/revisions\/28163"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/27765"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=27760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=27760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=27760"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=27760"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=27760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}